Proxy Base Station based Authentication Protocol for Broadband Wireless Network

نویسندگان

  • Fuden Tshering
  • Prachi Deshpande
  • Anjali Sardana
چکیده

The fourth generation technology of broadband wireless networks i.e. WiMAX (Worldwide Interoperability for Microwave Access) became popular due to its features like high speed internet access, large coverage area and interoperability for different type of devices. Non-Line ofsight propagation with lower frequency improvement makes WiMAX vulnerable to various security threats. Hence, authentication and authorization are used for protecting network from various attacks. Although there are standard authentication protocols in IEEE 802.16, but still WiMAX is vulnerable to attacks such as replay attack, DoS (denial of service attack), interleaving attack etc. In this paper, an exhaustive analysis of existing solutions in standard PKMv2 (privacy key management version 2) protocol is presented. The Proxy Base Station based authentication protocol addresses the major attacks namely DoS attack, interleaving attack, replay attack and downgrade attack. With the introduction of PS (proxy base station), the task of validation is distributed between the PS and BS (base station), it resolves the DoS attack due to the resource exhausting validation procedure [23]. Our proposed authentication protocol is modeled and verified on CPN (Colored PetriNet) tool (version 3.0.2)[1, 2] with and without intruder and compared with PKMv2 standard protocol. The state space analysis report for standard verification parameters shows that our proposed protocol satisfies the desired properties of liveliness and fairness with negligible overheads and it is secure and efficient. General Terms Security, Wireless, Algorithms, Networks

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Pre-authentication and Selection of suitable target Base Station during Handover procedure in Mobile WiMAX Network

-WiMAX (Worldwide Interoperability for Microwave Access) is an emerging technology that can provide wireless broadband access at the data rates of 70 Mbps over 50 kilometres to both home and business customers. WiMAX is cost effective and offers higher data rates than other wireless networks. It supports both fixed and mobile applications. WiMAX is easier to deploy as compared to other networks...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Secure Data Packet of Cluster Head and Base Station in Wireless Sensor Networks

LEACH in wireless sensor networks (WSNs) achieves good performance with reserving energy consumption and decreasing system delay. LEACH protocol does not consider a security issue for ensuring the protection of the network. So the security in LEACH is a complicated task. were we improved the LEACH protocol called a novel algorithm to select cluster heads with highest and balanced energy in wire...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013